RacketStore: Measurements of ASO Deception in Google Play via Mobile and
App Usage
- URL: http://arxiv.org/abs/2111.10400v1
- Date: Fri, 19 Nov 2021 19:24:48 GMT
- Title: RacketStore: Measurements of ASO Deception in Google Play via Mobile and
App Usage
- Authors: Nestor Hernandez, Ruben Recabarren, Bogdan Carbunar, Syed Ishtiaque
Ahmed
- Abstract summary: We present measurements from a study of 943 installs of RacketStore on 803 unique devices controlled by ASO providers and regular users.
We reveal significant differences between ASO providers and regular users in terms of the number and types of user accounts registered on their devices.
We show that they can train supervised learning algorithms to detect paid app installs and fake reviews with an F1-measure of 99.72%.
- Score: 20.13310058856793
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Online app search optimization (ASO) platforms that provide bulk installs and
fake reviews for paying app developers in order to fraudulently boost their
search rank in app stores, were shown to employ diverse and complex strategies
that successfully evade state-of-the-art detection methods. In this paper we
introduce RacketStore, a platform to collect data from Android devices of
participating ASO providers and regular users, on their interactions with apps
which they install from the Google Play Store. We present measurements from a
study of 943 installs of RacketStore on 803 unique devices controlled by ASO
providers and regular users, that consists of 58,362,249 data snapshots
collected from these devices, the 12,341 apps installed on them and their
110,511,637 Google Play reviews. We reveal significant differences between ASO
providers and regular users in terms of the number and types of user accounts
registered on their devices, the number of apps they review, and the intervals
between the installation times of apps and their review times. We leverage
these insights to introduce features that model the usage of apps and devices,
and show that they can train supervised learning algorithms to detect paid app
installs and fake reviews with an F1-measure of 99.72% (AUC above 0.99), and
detect devices controlled by ASO providers with an F1-measure of 95.29% (AUC =
0.95). We discuss the costs associated with evading detection by our
classifiers and also the potential for app stores to use our approach to detect
ASO work with privacy.
Related papers
- SPA-Bench: A Comprehensive Benchmark for SmartPhone Agent Evaluation [89.24729958546168]
We present SPA-Bench, a comprehensive SmartPhone Agent Benchmark designed to evaluate (M)LLM-based agents.
SPA-Bench offers three key contributions: A diverse set of tasks covering system and third-party apps in both English and Chinese, focusing on features commonly used in daily routines.
A novel evaluation pipeline that automatically assesses agent performance across multiple dimensions, encompassing seven metrics related to task completion and resource consumption.
arXiv Detail & Related papers (2024-10-19T17:28:48Z) - What If We Had Used a Different App? Reliable Counterfactual KPI Analysis in Wireless Systems [52.499838151272016]
This paper addresses the "what-if" problem of estimating the values of key performance indicators (KPIs) that would have been obtained if a different app had been implemented by the radio access network (RAN)
We propose a conformal-prediction-based counterfactual analysis method for wireless systems that provides reliable "error bars" for the estimated, containing the true with a user-defined probability.
arXiv Detail & Related papers (2024-09-30T18:47:26Z) - What Is an App Store? The Software Engineering Perspective [8.551225450507687]
"App stores" are online software stores where end users may browse, purchase, download, and install software applications.
By far, the best known app stores are associated with mobile platforms, such as Google Play for Android and Apple's App Store for iOS.
Today, there is a rich diversity of app stores and these stores have largely been overlooked by researchers.
arXiv Detail & Related papers (2024-01-08T23:56:45Z) - MobileRec: A Large-Scale Dataset for Mobile Apps Recommendation [13.500977307018669]
MobileRec contains 19.3 million user interactions (i.e., user reviews on apps) with over 10K unique apps across 48 categories.
MobileRec presents users' ratings as well as sentiments on installed apps, and each app contains rich metadata such as app name, category, description, and overall rating.
arXiv Detail & Related papers (2023-03-12T06:39:40Z) - Erasing Labor with Labor: Dark Patterns and Lockstep Behaviors on Google
Play [13.658284581863839]
Google Play's policy forbids the use of incentivized installs, ratings, and reviews to manipulate the placement of apps.
We examine install-incentivizing apps through a socio-technical lens and perform a mixed-methods analysis of their reviews and permissions.
Our dataset contains 319K reviews collected daily over five months from 60 such apps that cumulatively account for over 160.5M installs.
We find evidence of fraudulent reviews on install-incentivizing apps, following which we model them as an edge stream in a dynamic bipartite graph of apps and reviewers.
arXiv Detail & Related papers (2022-02-09T16:54:27Z) - Federated Learning-based Active Authentication on Mobile Devices [98.23904302910022]
User active authentication on mobile devices aims to learn a model that can correctly recognize the enrolled user based on device sensor information.
We propose a novel user active authentication training, termed as Federated Active Authentication (FAA)
We show that existing FL/SL methods are suboptimal for FAA as they rely on the data to be distributed homogeneously.
arXiv Detail & Related papers (2021-04-14T22:59:08Z) - Moving Object Classification with a Sub-6 GHz Massive MIMO Array using
Real Data [64.48836187884325]
Classification between different activities in an indoor environment using wireless signals is an emerging technology for various applications.
In this paper, we analyze classification of moving objects by employing machine learning on real data from a massive multi-input-multi-output (MIMO) system in an indoor environment.
arXiv Detail & Related papers (2021-02-09T15:48:35Z) - Understanding Incentivized Mobile App Installs on Google Play Store [16.095843448016552]
"Incentivized" advertising platforms allow mobile app developers to acquire new users by directly paying users to install and engage with mobile apps.
Apple App Store and Google Play Store discourage incentivized installs because they can manipulate app store metrics.
We present the first study to understand the ecosystem of incentivized mobile app install campaigns in Android.
arXiv Detail & Related papers (2020-10-04T07:27:28Z) - Emerging App Issue Identification via Online Joint Sentiment-Topic
Tracing [66.57888248681303]
We propose a novel emerging issue detection approach named MERIT.
Based on the AOBST model, we infer the topics negatively reflected in user reviews for one app version.
Experiments on popular apps from Google Play and Apple's App Store demonstrate the effectiveness of MERIT.
arXiv Detail & Related papers (2020-08-23T06:34:05Z) - An Empirical Study of In-App Advertising Issues Based on Large Scale App
Review Analysis [67.58267006314415]
We present a large-scale analysis on ad-related user feedback from App Store and Google Play.
From a statistical analysis of 36,309 ad-related reviews, we find that users care most about the number of unique ads and ad display frequency during usage.
Some ad issue types are addressed more quickly by developers than other ad issues.
arXiv Detail & Related papers (2020-08-22T05:38:24Z) - Less is More: A privacy-respecting Android malware classifier using
Federated Learning [2.1301190271783312]
LiM is a malware classification framework that leverages Federated Learning to detect and classify malicious apps.
Information about newly installed apps is kept locally on users' devices, so that the provider cannot infer which apps were installed by users.
We show that LiM is robust against both poisoning attacks by adversaries who control half of the clients, and inference attacks performed by an honest-but-curious cloud server.
arXiv Detail & Related papers (2020-07-16T13:20:33Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.